<p><a href=\"http://torrentfreak.com/protect-yourself-from-edonkey-spy-servers/\" target=\"_blank\"><u>rotect Yourself from eDonkey Spy Servers</u></a><br /><a href=\"http://p2pnet.net/story/5857\" target=\"_blank\"><u>eDonkey2k spy server increase</u></a><br /><br />引用eMule-Project:</p><p>Forget the eD2k servers, many of them left are fake, setup by anti piracy organizations to monitor you. </p><p>Connecting to a bad ed2k server can have some nasty consequences. They monitor your activities and report to anti-p2p outfits. They direct you to non-existent files, corrupted fakes and hide files which others genuinely want to share. Learn how to protect yourself.<br /><br /><br />Millions of file-sharers use the eDonkey (ed2k) network daily with every conceivable file and media type available for download. However, for millions of users on the ed2k network there is a threat hidden below the surface - fake eDonkey servers, estimated to be as many as 60% of all the ed2k servers currently online.<br /><br />These bad servers can spy on you, track your activities and report your behavior to anti-p2p companies. Others are concerned in engineering a situation to put malware on your machine. For the incomplete downloads in progress, the user’s ed2k client asks all the servers configured in its server list to find additional sources but of course, if you connected to a bad server it now knows everything that has been happening in your client - a major privacy breach.<br /><br />Fake servers are also there to misdirect, to cheat, to confuse. “Simply put, those servers lie. And they do a lot of it.” explained qm2003 from eMule-Project. “When a client is searching for something, fake servers will return files and sources to files that are actually non-existent, empty or garbage.” <br /><br />Furthermore, files being offered for share by users connected to a fake server will not show up in search results of queries made by other users, effectively starving the network of millions of files. “Some fake servers deliberately return results with supposedly thousands of sources to prematurely end searches” explains qm2003, “And to make matters worse, those search results contain malware that will infect the system of any client downloading and executing those files.” </p> |